Herb and Spice of the Week – Annatto

aheneghana:

Annatto – Spice of the week

Originally posted on My Meals are on Wheels:

Open fruit of the achiote tree

Open fruit of the achiote tree

Annatto, sometimes called roucou or achiote, is derived from the seeds of the achiote trees of tropical and subtropical regions around the world. The seeds are sourced to produce a carotenoid-based yellow to orange food coloring and flavor. Its scent is described as “slightly peppery with a hint of nutmeg” and flavor as “slightly nutty, sweet and peppery”.
In commercial processing, annatto coloring is extracted from the reddish pericarp which surrounds the seed of the achiote (Bixa orellana L.). Historically, it has been used as coloring in many cheeses (e.g., Cheddar, Gloucester, Red Leicester), cheese products (e.g. American cheese, Velveeta), and dairy spreads (e.g. butter, margarine). Annatto can also be used to color a number of non-dairy foods such as rice, custard powder, baked goods, seasonings, processed potatoes, snack foods, breakfast cereals and smoked fish. It has been linked to cases of food-related allergies.

View original 834 more words

Wenn eine Mikrowelle läuft, sollten Sie das Weite suchen

aheneghana:

Thought I d share this with you.
You can easy translate with google, but here so much :
‘ When a microwave is on, you should get far away ‘ …
Wow.
I never liked it right from the start, never bought one too.
Imagine all those who didn’t know and eat their food, daily, warmed with the machine. Imagine ..

Originally posted on PRAVDA TV - Live The Rebellion:

mikrowelle-strahlung

Jeder auf der Welt weiß, dass Mikrowellenherde das Essen bestrahlen, Nährstoffe vernichten und gesundheitsschädlich sind – doch die meisten nehmen das der Bequemlichkeit halber in Kauf.

In 90 Prozent der Haushalte in den USA und weltweit und in fast allen »Hinterzimmern« von Büros findet sich deshalb eine »Mikro« (Strahlenofen). Eine Mikrowelle zu besitzen, ist fast genauso alltäglich wie der Besitz eines Fernsehgeräts.

Kaum jemand weiß, dass sich Metalle im Körper, beispielsweise Zahnfüllungen, aus-dehnen und zu chronischen Schmerzen und Schädigungen führen können, an die niemand denkt, auch die Ärzte nicht. Und wenn sich diese Metalle ausdehnen, können sie Giftstoffe wie Quecksilber freisetzen und ins Blut abgeben. Das sollte nachdenklich machen.

Wo stehen Sie, wenn etwas in der Mikrowelle gart? Wie nahe sind Sie dem Gerät? Warten Sie die letzten 20 bis 30 Sekunden direkt vor der Tür, um sie zu öffnen, als wäre das Gerät sicher, solange die Tür geschlossen ist?…

View original 943 more words

THE N>S>A> TACTICS EXPLAINED

N>S>A> TAO UNIT

The TAO unit is, for all intents and purposes, a hacking group. The TAO aims to exploit hardware and software to gather intelligence on supposedly foreign entities. This is facilitated by gaining access to telecommunication companies that operate the backbone of the Internet and capturing Internet traffic, as well as intercepting physical devices and inserting monitoring capabilities onto them. Since its inception in 1998, the group has grown to be one of the most important parts of the NSA because of society’s reliance on computers and the access necessary to monitor those communications. The TAO unit was designed to extend previous capabilities for monitoring radio communications to general monitoring of a broad array of networked systems. Since a potential target could be using practically any technology, the TAO unit likely targets network equipment because of the limited number of devices to attack and the broad access it could offer.

In the now infamous files leaked by former NSA contractor Edward Snowden, details of the TAO unit’s tasks, capabilities and functions were released to the general public. For example, the documents exposed information concerning how to compromise systems before they leave the manufacturer, even if they are never connected to a TCP/IP network and other scenarios. Some of the concepts believed to be pioneered by TAO have since been used in credit card skimmer attacks and even USB-based malware. Additionally, there have been many examples of hardware or software shipped with malware already installed and instances of vendors shipping devices where even the most basic security evaluations were not undertaken. While enterprises should plan for and defend against these threats, they must first know how to accomplish it.

The NSA has interrupted the supply chain in attacks so that its monitoring tools will already be present on systems before the devices even connect to a target network. Unfortunately, the supply chain weaknesses are not well understood by enterprises and most are ill-prepared to address hardware that has physical tools already installed on them for intelligence gathering. The physical tool could just send communications to an outside party or it could be used to provide persistence even if the currently installed OS is removed.

While enterprises could reinstall factory operating systems, it is advisable to monitor newly installed systems for any suspicious network access prior to putting them into the production environment.

The reports detailing the NSA’s capabilities are both good and bad: not only do they give the good guys hints about areas to investigate, but they also provide insight for the bad guys and potentially help them shorten the development cycle of future attacks. In regard to man-in-the-middle attacks, the TAO’s QUANTUM program offers fascinating detail on how a communication channel can be monitored, even if the communication channel is encrypted. Enterprises should be aware that attackers outside the NSA are likely hard at work refining the techniques on the QUANTUM capabilities list and will soon seek to apply them to their own targeted attacks — this may already be happening.

Defending TAO techniques: What can be done?

One of the most valuable after effects of the leaks has been giving individuals and enterprises alike the knowledge of where particular technologies and processes, such as network communications and supply chains, are vulnerable to creative attack methods. This should certainly help enterprises prioritize resource allocation toward the defense measures that are needed to prevent falling prey to these issues.

While defending against the NSA itself as a U.S. company simply isn’t feasible, enterprises do have some options. Prior to adopting new hardware or software, enterprises should validate it for tampering. On the other hand, vendors could also provide customers with a method to validate that software and hardware hasn’t been tampered with, such as using signed software. These same steps could be used on a regular basis to look for suspicious activity.

It is also important that enterprises and individuals assume any and all communication is being monitored, even on dedicated circuits. Implementing encryption for all communications beyond merely using a VPN will help thwart tapping and eavesdropping. Enterprises with high security requirements could even protect against attacks using wireless communications through a Faraday cage, though it is unreasonable for most organizations. Alternately, enterprises could get a radio frequency monitor to sweep through their facilities and monitor for unauthorized connections. This is similar to monitoring the network for any suspicious network connections.

In addition to presuming that all lines of communication are being monitored, enterprises could also heed some of the NSA’s own advice around assuming that their businesses are also compromised. It can help keep organizations on their toes if they think they are being targeted by better funded, smarter and more advanced attackers.

EUROGENDFOR: Die geheime EU-Spezialeinheit zur Niederschlagung von Aufständen (Video)

aheneghana:

EUROGENDFOR – read ( German )

Originally posted on PRAVDA TV - Live The Rebellion:

eurogendfor-europa-privatermee

Die EU hat sich mit den Geldern europäischer Länder ja was Schönes zusammengebastelt.

Die EUROGENDFOR ist eine schnelle Eingreiftruppe die in Krisengebieten, Aufstände niederschlagen soll. Dabei hat diese Truppe alle Vollmachten um zu tun und zu lassen was sie will. Das Töten von Menschen ist gesetzlich festgeschrieben. Somit ist die EUROGENDFOR eine Truppe die sich in keinem europäischen Land dessen gesetzlichen Bestimmung unterordnen muss.

Die EUROGENDFOR selbst besteht aus rund 700 bis 800 ständig einsatzbereiten „Kämpfern“ und rund 2.300 harren im Reservistenmodus der Dinge die da kommen, sodass eine Gesamtstärke von gut 3.000 Mann mobilisierbar ist. Gegründet wurde die EUROGENDFOR von Frankreich, Italien, Spanien, Portugal und den Niederlanden.

Deutschland spielt hier nicht mit, weil es eine andere Auffassung zur Aufgabenteilung zwischen Polizei und Militär vertritt und deshalb diese Mischform ablehnt – bis jetzt noch?

Diese Truppe verkörpert alle Gattungen, vom Polizisten bis zum Soldaten, einschließlich eigenem Geheimdienst.

Wer sich für…

View original 1,099 more words

Spring is…

aheneghana:

Sometimes we all wish to be living on a ranch .

Originally posted on Meanwhile, back at the ranch...:

Sometimes the day is so lovely, you just have to go out in it.

Sometimes the moon shows up before the sun goes down and lines up just right in the blue sky hovering peacefully over golden grass.

Grass that was hiding under all that snow, snow that’s melting because it’s 50 degrees ABOVE zero now, so you decide to pull on your muck boots and splash around in it a little, feeling so good you don’t even mind the little hole in the right one that lets the water in to soak your socks.

It doesn’t matter. It’s summer now.

Your feet don’t get cold in the summer.

And you took your camera, because you need to document what a beautiful mess it all is when the thaw comes.

You need to photograph those tiny bubbles.

You need to capture those trees standing nice and tall and straight.

You…

View original 61 more words